Search results for: earning sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1110

Search results for: earning sharing

420 An Application of Bidirectional Option Contract to Coordinate a Dyadic Fashion Apparel Supply Chain

Authors: Arnab Adhikari, Arnab Bisi

Abstract:

Since the inception, the fashion apparel supply chain is facing the problem of high demand uncertainty. Often the demand volatility compels the corresponding supply chain member to incur substantial holding cost and opportunity cost in case of the overproduction and the underproduction scenario, respectively. It leads to an uncoordinated fashion apparel supply chain. There exist several scholarly works to achieve coordination in the fashion apparel supply chain by employing the different contracts such as the buyback contract, the revenue sharing contract, the option contract, and so on. Specially, the application of option contract in the apparel industry becomes prevalent with the changing global scenario. Exploration of existing literature related to the option contract reveals that most of the research works concentrate on the one direction demand adjustment i.e. either to match the demand upwards or downwards. Here, we present a holistic approach to coordinate a dyadic fashion apparel supply chain comprising one manufacturer and one retailer with the help of bidirectional option contract. We show a combination of wholesale price contract and bidirectional option contract can coordinate the under expanded supply chain. We also propose a framework that captures the variation of the apparel retailer’s order quantity and the apparel manufacturer’s production quantity with the changing exercise price for the different ranges of the option price. We analytically explore that corresponding cost parameters of the supply chain members along with the nature of demand distribution play an instrumental role in the coordination as well as the retailer’s ordering decision.

Keywords: fashion apparel supply chain, supply chain coordination, wholesale price contract, bidirectional option contract

Procedia PDF Downloads 420
419 Identifying Enablers and Barriers of Healthcare Knowledge Transfer: A Systematic Review

Authors: Yousuf Nasser Al Khamisi

Abstract:

Purpose: This paper presents a Knowledge Transfer (KT) Framework in healthcare sectors by applying a systematic literature review process to the healthcare organizations domain to identify enablers and barriers of KT in Healthcare. Methods: The paper conducted a systematic literature search of peer-reviewed papers that described key elements of KT using four databases (Medline, Cinahl, Scopus, and Proquest) for a 10-year period (1/1/2008–16/10/2017). The results of the literature review were used to build a conceptual framework of KT in healthcare organizations. The author used a systematic review of the literature, as described by Barbara Kitchenham in Procedures for Performing Systematic Reviews. Findings: The paper highlighted the impacts of using Knowledge Management (KM) concept at a healthcare organization in controlling infectious diseases in hospitals, improving family medicine performance and enhancing quality improvement practices. Moreover, it found that good-coding performance is analytically linked with a knowledge sharing network structure rich in brokerage and hierarchy rather than in density. The unavailability or ignored of the latest evidence on more cost-effective or more efficient delivery approaches leads to increase the healthcare costs and may lead to unintended results. Originality: Search procedure produced 12,093 results, of which 3523 were general articles about KM and KT. The titles and abstracts of these articles had been screened to segregate what is related and what is not. 94 articles identified by the researchers for full-text assessment. The total number of eligible articles after removing un-related articles was 22 articles.

Keywords: healthcare organisation, knowledge management, knowledge transfer, KT framework

Procedia PDF Downloads 115
418 Applications of Drones in Infrastructures: Challenges and Opportunities

Authors: Jin Fan, M. Ala Saadeghvaziri

Abstract:

Unmanned aerial vehicles (UAVs), also referred to as drones, equipped with various kinds of advanced detecting or surveying systems, are effective and low-cost in data acquisition, data delivery and sharing, which can benefit the building of infrastructures. This paper will give an overview of applications of drones in planning, designing, construction and maintenance of infrastructures. The drone platform, detecting and surveying systems, and post-data processing systems will be introduced, followed by cases with details of the applications. Challenges from different aspects will be addressed. Opportunities of drones in infrastructure include but not limited to the following. Firstly, UAVs equipped with high definition cameras or other detecting equipment are capable of inspecting the hard to reach infrastructure assets. Secondly, UAVs can be used as effective tools to survey and map the landscape to collect necessary information before infrastructure construction. Furthermore, an UAV or multi-UVAs are useful in construction management. UVAs can also be used in collecting roads and building information by taking high-resolution photos for future infrastructure planning. UAVs can be used to provide reliable and dynamic traffic information, which is potentially helpful in building smart cities. The main challenges are: limited flight time, the robustness of signal, post data analyze, multi-drone collaboration, weather condition, distractions to the traffic caused by drones. This paper aims to help owners, designers, engineers and architects to improve the building process of infrastructures for higher efficiency and better performance.

Keywords: bridge, construction, drones, infrastructure, information

Procedia PDF Downloads 95
417 Islamic Credit Risk Management in Murabahah Financing: The Study of Islamic Banking in Malaysia

Authors: Siti Nor Amira Bt. Mohamad, Mohamad Yazis B. Ali Basah, Muhammad Ridhwan B. Ab. Aziz, Khairil Faizal B. Khairi, Mazlynda Bt. Md. Yusuf, Hisham B. Sabri

Abstract:

The understanding of risk and the concept of it occurs associated in Islamic financing was well-known in the financial industry by the using of Profit-and-Loss Sharing (PLS). It was presently in any Islamic financial transactions in order to comply with shariah rules. However, the existence of risk in Murabahah contract of financing is an ability that the counterparty is unable to complete its obligations within the agreed terms. Therefore, it is called as credit or default risk. Credit risk occurs when the client fails to make timely payment after the bank makes complete delivery of assets. Thus, it affects the growth of the bank as the banking business is in no position to have appropriate measures to cover the risk. Therefore, the bank may impose penalty on the outstanding balance. This paper aims to highlight the credit risk determinant and issues surrounding in Islamic bank in Malaysia in terms of Murabahah financing and how to manage it by using the proper techniques. Finally, it explores the credit risk management concept that might solve the problems arise. The study found that the credit risk can be managed properly by improving the use of comprehensive reference checklist of business partners on their character and past performance as well as their comprehensive database. Besides that, prevention of credit risk can be done by using collateral as security against the risk and we also argue on the Shariah guidelines and procedures should be implement coherently by the banking business because so that the risk would be control by having an effective instrument for Islamic modes of financing.

Keywords: Islamic banking, credit risk, Murabahah financing, risk mitigation

Procedia PDF Downloads 425
416 Partnership Oriented Innovation Alliance Strategy Based on Market Feedback

Authors: Victor Romanov, Daria Efimenko

Abstract:

The focus on innovation in modern economy is the main factor in surviving business in a competitive environment. The innovations are based on the search and use of knowledge in a global context. Nowadays consumers and market demand are the main innovation drivers. This leads to build a business as a system with feedback, promptly restructuring production and innovation implementation in response to market demands. In modern knowledge economy, because of speed of technical progress, the product's lifecycle became much shorter, what makes more stringent requirements for innovation implementation on the enterprises of and therefore the possibility for enterprise for receiving extra income is decreasing. This circumstance imposes additional requirements for the replacement of obsolete products and the prompt release of innovative products to the market. The development of information technologies has led to the fact that only in the conditions of partnership and knowledge sharing with partners it is possible to update products quickly for innovative products. Many companies pay attention to updating innovations through the search for new partners, but the task of finding new partners presents some difficulties. The search for a suitable one includes several stages such as: determining the moment of innovation-critical, introducing a search, identifying search criteria, justifying and deciding on the choice of a partner. No less important is the question of how to manage an innovative product in response to a changing market. The article considers the problems of information support for the search for the source of innovation and partnership to decrease the time for implementation of novelty products.

Keywords: partnership, novelty, market feedback, alliance

Procedia PDF Downloads 172
415 Information Overload, Information Literacy and Use of Technology by Students

Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović

Abstract:

The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.

Keywords: information overload, computers, mobile devices, digital media, information literacy, students

Procedia PDF Downloads 256
414 Knowledge, Attitude and Practice Towards the Attendance of Antenatal Care Services at Mukono General Hospital

Authors: Nabaweesi Josephine, Namwanje Regina Germina

Abstract:

Antenatal care is referred to as the totality of care given to pregnant women from conception to delivery from a certified health care setting. A number of 8 contacts is recommended throughout pregnancy, according to WHO, 2016. Antenatal services are free in Uganda courtesy of the government of Uganda, though attendance is still very low, which has continued to cause maternal and infant mortality and morbidity from preventable causes. Early booking has an advantage for proper pregnancy information sharing and pregnancy monitoring. The purpose of this study was to determine pregnant women's knowledge, attitudes, and practices towards attendance of antenatal care at Mukono General Hospital. A sample of 60 pregnant women was used, and a descriptive quantitative design was employed. Data was collected using a structured questionnaire consisting of questions about socio-demographic factors, knowledge, attitude, and practice, and this was affected using the structured interview method. Pregnant women had good practice at 90.2%, a positive attitude of 94.6%, and slightly less knowledge of 66.7%. Only 12% were knowledgeable about the number of antenatal care visits recommended, 45% had knowledge about when to initiate first antenatal care visit, and 79% had a positive attitude towards the early booking. We recommend that pregnant women are given all the necessary information regarding antenatal care with special emphasis on the recommended number of visits and when to initiate their first visit and encourage early booking in order to achieve the 8 contacts WHO policy for antenatal care since when we increase knowledge, we increase antenatal care utilization according to Anderson's behavioral model.

Keywords: ANC- antenatal care, contacts, mortality, morbidity

Procedia PDF Downloads 81
413 The Porcine Reproductive and Respiratory Syndrome Virus Genotype 2 (PRRSV-2)-derived Oncolytic Protein Reprograms Tumor-Associated Macrophages

Authors: Farrah Putri Salmanida, Mei-Li Wu, Rika Wahyuningtyas, Wen-Bin Chung, Hso-Chi Chaung, Ko-Tung Chang

Abstract:

Within the field of immunotherapy, oncolytic virotherapy (OVT) employs dual approaches that directly eliminate tumor cells while preserving healthy ones and indirectly reprogram the tumor microenvironment (TME) to elicit antitumor responses. Within the TME, tumor associated macrophages (TAMs) manifest characteristics akin to those of anti-inflammatory M2 macrophages, thus earning the designation of M2-like TAMs. In prior research, two antigens denoted as A1 (g6Ld10T) and A3 (ORF6L5), derived from a complete sequence of ORF5 with partial sequence of ORF6 in Porcine Reproductive and Respiratory Syndrome Virus Genotype 2 (PRRSV-2), demonstrated the capacity to repolarize M2-type porcine alveolar macrophages (PAMs) into M1 phenotypes. In this study, we sought for utilizing OVT strategies by introducing A1 or A3 on TAMs to endow them with the anti-tumor traits of M1 macrophages while retaining their capacity to target cancer cells. Upon exposing human THP-1-derived M2 macrophages to a cross-species test with 2 µg/ml of either A1 or A3 for 24 hours, real time PCR revealed that A3, but not A1, treated cells exhibited upregulated gene expressions of M1 markers (CCR7, IL-1ß, CCL2, Cox2, CD80). These cells reacted to virus-derived antigen, as evidenced by increased expression of pattern-recognition receptors TLR3, TLR7, and TLR9, subsequently providing feedback in the form of type I interferon responses like IFNAR1, IFN-ß, IRF3, IRF7, OAS1, Mx1, and ISG15. Through an MTT assay, only after 15 µg/ml of A3 treatment could the cell viability decrease, with a predicted IC50 of 16.96 µg/ml. Interestingly, A3 caused dose-dependent toxicity to a rat C6 glial cancer cell line even at doses as low as 2.5 µg/ml and reached its IC50 at 9.419 µg/ml. Using Annexin V/7AAD staining and PCR test, we deduced that a significant proportion of C6 cells were undergoing the early apoptosis phase predominantly through the intrinsic apoptosis cascade involving Bcl-2 family proteins. Following this stage, we conducted a test on A3’s repolarization ability, which revealed a significant rise in M1 gene expression markers, such as TNF, CD80, and IL-1ß, in M2-like TAMs generated in vitro from murine RAW264.7 macrophages grown with conditioned medium of 4T1 breast cancer cells. This was corroborated by the results of transcriptome analysis, which revealed that the primary subset among the top 10 to top 30 significantly upregulated differentially expressed genes (DEGs) dominantly consisted of M1 macrophages profiles, including Ccl3, Ccl4, Csf3, TNF, Bcl6b, Stc1, and Dusp2. Our findings unveiled the remarkable potential of the PRRSV-derived antigen A3 to repolarize macrophages while also being capable of selectively inducing apoptosis in cancerous cells. While further in vivo study is needed for A3, it holds promise as an adjuvant by its dual effects in cancer therapy modalities.

Keywords: cancer cell apoptosis, interferon responses, macrophage repolarization, recombinant protein

Procedia PDF Downloads 33
412 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 44
411 LanE-change Path Planning of Autonomous Driving Using Model-Based Optimization, Deep Reinforcement Learning and 5G Vehicle-to-Vehicle Communications

Authors: William Li

Abstract:

Lane-change path planning is a crucial and yet complex task in autonomous driving. The traditional path planning approach based on a system of carefully-crafted rules to cover various driving scenarios becomes unwieldy as more and more rules are added to deal with exceptions and corner cases. This paper proposes to divide the entire path planning to two stages. In the first stage the ego vehicle travels longitudinally in the source lane to reach a safe state. In the second stage the ego vehicle makes lateral lane-change maneuver to the target lane. The paper derives the safe state conditions based on lateral lane-change maneuver calculation to ensure collision free in the second stage. To determine the acceleration sequence that minimizes the time to reach a safe state in the first stage, the paper proposes three schemes, namely, kinetic model based optimization, deep reinforcement learning, and 5G vehicle-to-vehicle (V2V) communications. The paper investigates these schemes via simulation. The model-based optimization is sensitive to the model assumptions. The deep reinforcement learning is more flexible in handling scenarios beyond the model assumed by the optimization. The 5G V2V eliminates uncertainty in predicting future behaviors of surrounding vehicles by sharing driving intents and enabling cooperative driving.

Keywords: lane change, path planning, autonomous driving, deep reinforcement learning, 5G, V2V communications, connected vehicles

Procedia PDF Downloads 180
410 Application of Griddization Management to Construction Hazard Management

Authors: Lingzhi Li, Jiankun Zhang, Tiantian Gu

Abstract:

Hazard management that can prevent fatal accidents and property losses is a fundamental process during the buildings’ construction stage. However, due to lack of safety supervision resources and operational pressures, the conduction of hazard management is poor and ineffective in China. In order to improve the quality of construction safety management, it is critical to explore the use of information technologies to ensure that the process of hazard management is efficient and effective. After exploring the existing problems of construction hazard management in China, this paper develops the griddization management model for construction hazard management. First, following the knowledge grid infrastructure, the griddization computing infrastructure for construction hazards management is designed which includes five layers: resource entity layer, information management layer, task management layer, knowledge transformation layer and application layer. This infrastructure will be as the technical support for realizing grid management. Second, this study divides the construction hazards into grids through city level, district level and construction site level according to grid principles. Last, a griddization management process including hazard identification, assessment and control is developed. Meanwhile, all stakeholders of construction safety management, such as owners, contractors, supervision organizations and government departments, should take the corresponding responsibilities in this process. Finally, a case study based on actual construction hazard identification, assessment and control is used to validate the effectiveness and efficiency of the proposed griddization management model. The advantage of this designed model is to realize information sharing and cooperative management between various safety management departments.

Keywords: construction hazard, griddization computing, grid management, process

Procedia PDF Downloads 245
409 The Relationship between Job Stress and Handover Effectiveness of Nurses

Authors: Rujnan Tuna, Ayse Cil Akinci

Abstract:

Work life takes up an important place in human life, and an employed person faces many stimuli from internal and external environments and is affected by them in a positive or negative way. Also, the handover process, which is the process of sharing information about the patient with other health professionals, is an important criterion to maintain patient care and enhance the quality of care provided. Handover is a key component for sustaining daily basic clinical practices and is also essential to maintain the safe patient care. This investigation followed a descriptive and correlation design in order to establish job stress and the handover efficiency of nurses and the relationship in between. The study was conducted with 192 nurses working in a public hospital in Istanbul between January and March 2017. Descriptive information form, Job Stressors Scale, and Handover Evaluation Scale were used to collect the data of the study. The data were analyzed by using IBM SPSS Statistics 22.0 statistical software. Approvals from participants, managers of institution, and ethics committee were taken for the study. As a result of the research, it was found that job stress was above the median value, and the highest score in the ‘work role conflict’ subdimension. Also, it was found that the effectiveness of the nurses' handover effectiviness was above the median value and the highest score in the ‘quality of information’ subdimension. In the study, there was a negatively weak correlation between ‘work role overload’ subdimension of Job Stressors Scale and ‘interaction and support’ subdimension of Handover Evaluation Scale. There is a need for further study in order to maintain patient safety.

Keywords: handover, job stress, nurse, patient

Procedia PDF Downloads 141
408 Muslim Husbands’ Participation in Women’s Health and Illness: A Descriptive Exploratory Study Applied to Muslim Women in Indonesia

Authors: Restuning Widiasih, Katherine Nelson, Joan Skinner

Abstract:

Muslim husbands have significant roles in the family including their roles in women’s health and illness. However, studies that explore Muslim husbands’ participation in women’s health is limited. The objective of this study was to uncover Muslim husbands’ participation in women’ health and illness including cancer prevention and screening. A descriptive exploratory approach was used involving 20 Muslim women from urban and rural areas of West Java Province, Indonesia. Muslim women shared experience related to their husbands support and activities in women’s health and illness. The data from the interviews were analyzed using the Comparative Analysis for Interview (CAI). Women perceived that husbands fully supported their health by providing opportunities for activities, and reminding them about healthy food, their workloads, and family planning. Husbands actively involved when women faced health issues including sharing knowledge and experience, discussing any health problems, advising for medical check-ups, and accompanying them for treatments. The analysis also found that husbands were less active and offered less advice regarding prevention and early detection of cancer. This study highlights the significant involvement of Muslim husbands in women’s health and illness, yet a lack of support from husbands related to screening and cancer prevention. This condition could be a burden for Muslim women to participate in health programs related to cancer prevention and early detection. Health education programs to improve Muslim husbands’ understanding of women’s health is needed.

Keywords: descriptive exploratory study, Muslim husbands, Muslim women, women's health and illness

Procedia PDF Downloads 487
407 Whether Buffer Zone Community Forests’ Benefits Are Distributed Fairly to Low-Income Users: Reflection From the Buffer Zone Community Forests in Bardia National Park, Nepal

Authors: Keshav Raj Acharya, Thakur Silwal, Neelam C. Poudyal

Abstract:

Buffer zones, the peripheral areas around the national parks and wildlife reserves, are available for the purpose of benefitting the local inhabitants by providing forest products for subsistence needs of basic forest products outside the protected areas. The forest area within the buffer zone has been managed as a buffer zone community forest (BZCF) for the last 25 years after the approval of the buffer zone management regulation 1996. With a case study of select BZCF in Bardia National Park, this study aims to analyze whether the benefit provided by BZCF is equally available to poor users among other socioeconomic classes of the users. The findings are based on the analysis of cross-sectional data involving household surveys (n=305) and key informants’ interviews (n=10) as well as office records available at different 5 buffer zone community forest user groups offices. Results indicate that despite the provisions of subsidized rates for poor; poor households were more deprived due to higher forest products price particularly, the timber price in buffer zone. Evidence also indicate that due to the increased forest coverage, the incidence of wildlife damage has also increased and impacted the poor more due to lack of land ownership as well as limited alternatives. Clear community forest management guidelines with equitable benefit sharing and compensatory mechanisms to the users of poor socioeconomic class have been identified as a solution to increase the benefit to poor users in BZCFUGs.

Keywords: crop depredation, forest products, users, wellbeing ranking

Procedia PDF Downloads 24
406 How Best Mentors mentor: A Metadiscursive Study of Mentoring Styles in Teacher Education

Authors: Cissy Li

Abstract:

Mentorship is a commonly used strategy for career development that has obvious benefits for students in undergraduate pre-service teacher training programs. In contrast to teaching practicum, which generally involves pedagogical supervision and performance evaluation by teachers, mentorship is more focused on sharing experiences, supporting challenges, and nurturing skills in order to promote personal and professional growth. To empower pre-service teachers and prepare them for potential challenges in the context of local English language teaching (ELT), an alumni mentoring program was established in the framework of communities of practice (CoP), with the mentors being in-service graduates working in local schools and mentees being students on the teacher-training programme in a Hong Kong university. By triangulating audio transcripts of mentoring sessions delivered by three top mentors with data from questionnaire responses and mentor logs, this paper examines the mentoring styles of the three best mentors from the metadiscursive perspective. It was found that, in a community of practice, mentors who may seem to enjoy a relative more dominant position, in fact, had to strategically and pragmatically employ metadiscursive resources to manage relationships with the mentees and organize talks in the mentoring process. Other attributing factors for a successful mentoring session include mentor personality and prior mentorship experiences, nature of the activities in the session, and group dynamics. This paper concludes that it is the combination of all the factors that constitute a particular mentoring style. The findings have implications for mentoring programs in teacher preparation.

Keywords: mentoring, teacher education, mentoring style, metadiscourse

Procedia PDF Downloads 72
405 The Paradox of Decentralization and Civic Culture: An Exploratory Study Applied to Local Governments in Papua New Guinea

Authors: Francis Wargirai

Abstract:

Since gaining independence in 1975, Papua New Guinea`s core challenge has been the consolidation of democracy against a backdrop of enormous social, political and territorial diversity. Consequently, the government has implemented several political reforms including decentralization. Constitutional planners believed that national unity, would be better achieved by sharing state power over centralization. They anticipated that this would institutionalize a democratic civic culture by providing opportunities to groups and individuals to make political decisions within their jurisdiction. This would then eventually lead to confidence and participation in the larger entity of the state. In retrospect, civil society and community based groups are largely underrated and have had minimal influence on decisions at the local level, consequently contributing to nepotism, patronism and cynicism. By applying an elitist approach to analyze how national political leaders exert their influence and power within the local government system and local communities, this paper argues that decentralization has fragmented local communities. With an absence of political party roots and deeply divided ethnic groups, national political leaders have used divide and rule tactics resulting in mistrust among citizens. Through their influence and power within local governments to dictate projects and services to certain areas, this has resulted in skepticism and divisions among civil society along different cultural cleavages. This has been a contributing factor to anomalies in democratic consolidation and democratic political culture in Papua New Guinea.

Keywords: civic culture, cultural cleavages, decentralization, democratic consolidation

Procedia PDF Downloads 150
404 A Survey of WhatsApp as a Tool for Instructor-Learner Dialogue, Learner-Content Dialogue, and Learner-Learner Dialogue

Authors: Ebrahim Panah, Muhammad Yasir Babar

Abstract:

Thanks to the development of online technology and social networks, people are able to communicate as well as learn. WhatsApp is a popular social network which is growingly gaining popularity. This app can be used for communication as well as education. It can be used for instructor-learner, learner-learner, and learner-content interactions; however, very little knowledge is available on these potentials of WhatsApp. The current study was undertaken to investigate university students’ perceptions of WhatsApp used as a tool for instructor-learner dialogue, learner-content dialogue, and learner-learner dialogue. The study adopted a survey approach and distributed the questionnaire developed by Google Forms to 54 (11 males and 43 females) university students. The obtained data were analyzed using SPSS version 20. The result of data analysis indicates that students have positive attitudes towards WhatsApp as a tool for Instructor-Learner Dialogue: it easy to reach the lecturer (4.07), the instructor gives me valuable feedback on my assignment (4.02), the instructor is supportive during course discussion and offers continuous support with the class (4.00). Learner-Content Dialogue: WhatsApp allows me to academically engage with lecturers anytime, anywhere (4.00), it helps to send graphics such as pictures or charts directly to the students (3.98), it also provides out of class, extra learning materials and homework (3.96), and Learner-Learner Dialogue: WhatsApp is a good tool for sharing knowledge with others (4.09), WhatsApp allows me to academically engage with peers anytime, anywhere (4.07), and we can interact with others through the use of group discussion (4.02). It was also found that there are significant positive correlations between students’ perceptions of Instructor-Learner Dialogue (ILD), Learner-Content Dialogue (LCD), Learner-Learner Dialogue (LLD) and WhatsApp Application in classroom. The findings of the study have implications for lectures, policy makers and curriculum developers.

Keywords: instructor-learner dialogue, learners-contents dialogue, learner-learner dialogue, whatsapp application

Procedia PDF Downloads 133
403 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 48
402 The Log S-fbm Nested Factor Model

Authors: Othmane Zarhali, Cécilia Aubrun, Emmanuel Bacry, Jean-Philippe Bouchaud, Jean-François Muzy

Abstract:

The Nested factor model was introduced by Bouchaud and al., where the asset return fluctuations are explained by common factors representing the market economic sectors and residuals (noises) sharing with the factors a common dominant volatility mode in addition to the idiosyncratic mode proper to each residual. This construction infers that the factors-residuals log volatilities are correlated. Here, we consider the case of a single factor where the only dominant common mode is a S-fbm process (introduced by Peng, Bacry and Muzy) with Hurst exponent H around 0.11 and the residuals having in addition to the previous common mode idiosyncratic components with Hurst exponents H around 0. The reason for considering this configuration is twofold: preserve the Nested factor model’s characteristics introduced by Bouchaud and al. and propose a framework through which the stylized fact reported by Peng and al. is reproduced, where it has been observed that the Hurst exponents of stock indices are large as compared to those of individual stocks. In this work, we show that the Log S-fbm Nested factor model’s construction leads to a Hurst exponent of single stocks being the ones of the idiosyncratic volatility modes and the Hurst exponent of the index being the one of the common volatility modes. Furthermore, we propose a statistical procedure to estimate the Hurst factor exponent from the stock returns dynamics together with theoretical guarantees, with good results in the limit where the number of stocks N goes to infinity. Last but not least, we show that the factor can be seen as an index constructed from the single stocks weighted by specific coefficients.

Keywords: hurst exponent, log S-fbm model, nested factor model, small intermittency approximation

Procedia PDF Downloads 5
401 Learning Communities and Collaborative Reflection for Teaching Improvement

Authors: Mariana Paz Sajon, Paula Cecilia Primogerio, Mariana Albarracin

Abstract:

This study recovers an experience of teacher training carried out in an Undergraduate Business School from a private university in Buenos Aires, Argentina. The purpose of the project was to provide teachers with an opportunity to reflect on their teaching practices at the university. The aim of the study is to systematize lessons and challenges that emerge from this teacher training experience. A group of teachers who showed a willingness to learn teaching abilities was selected to work. They completed a formative journey working in learning communities starting from the immersion in different aspects of teaching and learning, class observations, and an individual and collaborative reflection exercise in a systematic way among colleagues. In this study, the productions of the eight teachers who are members of the learning communities are analyzed, framed in an e-portfolio that they prepared during the training journey. The analysis shows that after the process of shared reflection, traits related to powerful teaching and meaningful learning have appeared in the classes. For their part, teachers reflect having reached an awareness of their own practices, identifying strengths and opportunities for improvement, and the experience of sharing their own way and knowing the successes and failures of others was valued. It is an educational journey of pedagogical transformation of the teachers, which is infrequent in business education, which could lead to a change in teaching practices for the entire Business School. The present study involves theoretical and pedagogic aspects of education in a business school in Argentina and its flow-on implications for the workplace that may be transferred to other educational contexts.

Keywords: Argentina, learning community, meaningful learning, powerful teaching, reflective practice

Procedia PDF Downloads 191
400 Visual Servoing for Quadrotor UAV Target Tracking: Effects of Target Information Sharing

Authors: Jason R. King, Hugh H. T. Liu

Abstract:

This research presents simulation and experimental work in the visual servoing of a quadrotor Unmanned Aerial Vehicle (UAV) to stabilize overtop of a moving target. Most previous work in the field assumes static or slow-moving, unpredictable targets. In this experiment, the target is assumed to be a friendly ground robot moving freely on a horizontal plane, which shares information with the UAV. This information includes velocity and acceleration information of the ground target to aid the quadrotor in its tracking task. The quadrotor is assumed to have a downward-facing camera which is fixed to the frame of the quadrotor. Only onboard sensing for the quadrotor is utilized for the experiment, with a VICON motion capture system in place used only to measure ground truth and evaluate the performance of the controller. The experimental platform consists of an ArDrone 2.0 and a Create Roomba, communicating using Robot Operating System (ROS). The addition of the target’s information is demonstrated to help the quadrotor in its tracking task using simulations of the dynamic model of a quadrotor in Matlab Simulink. A nested PID control loop is utilized for inner-loop control the quadrotor, similar to previous works at the Flight Systems and Controls Laboratory (FSC) at the University of Toronto Institute for Aerospace Studies (UTIAS). Experiments are performed with ground truth provided by an indoor motion capture system, and the results are analyzed. It is demonstrated that a velocity controller which incorporates the additional information is able to perform better than the controllers which do not have access to the target’s information.

Keywords: quadrotor, target tracking, unmanned aerial vehicle, UAV, UAS, visual servoing

Procedia PDF Downloads 314
399 Utilising an Online Data Collection Platform for the Development of a Community Engagement Database: A Case Study on Building Inter-Institutional Partnerships at UWC

Authors: P. Daniels, T. Adonis, P. September-Brown, R. Comalie

Abstract:

The community engagement unit at the University of the Western Cape was tasked with establishing a community engagement database. The database would store information of all community engagement projects related to the university. The wealth of knowledge obtained from the various disciplines would be used to facilitate interdisciplinary collaboration within the university, as well as facilitating community university partnership opportunities. The purpose of this qualitative study was to explore electronic data collection through the development of a database. Two types of electronic data collection platforms were used, namely online questionnaire and email. The semi structured questionnaire was used to collect data related to community engagement projects from different faculties and departments at the university. There are many benefits for using an electronic data collection platform, such as reduction of costs and time, ease in reaching large numbers of potential respondents, and the possibility of providing anonymity to participants. Despite all the advantages of using the electronic platform, there were as many challenges, as depicted in our findings. The findings suggest that certain barriers existed by using an electronic platform for data collection, even though it was in an academic environment, where knowledge and resources were in abundance. One of the challenges experienced in this process was the lack of dissemination of information via email to staff within faculties. The actual online software used for the questionnaire had its own limitations, such as only being able to access the questionnaire from the same electronic device. In a few cases, academics only completed the questionnaire after a telephonic prompt or face to face meeting about "Is higher education in South Africa ready to embrace electronic platform in data collection?"

Keywords: community engagement, database, data collection, electronic platform, electronic tools, knowledge sharing, university

Procedia PDF Downloads 241
398 Meeting the Pedophile: Attitudes toward Pedophilia among Psychology Students

Authors: Rebecca Heron, Julie Karsten, Lena Schweikert

Abstract:

Adverse consequences of stigma towards pedophilia can, among other things, increase dynamic risk factors for sexual offending. Decreasing stigma, therefore, is a plausible approach in the attempt to prevent child sexual abuse. Stigma research suggests that providing direct contact to a stigmatized individual is the most efficient way of reducing stigma. The present study involved an educational intervention, followed by direct contact to a pedophile, to maximize effectiveness. It aimed at finding out whether a dichotomous anti-stigma intervention can change psychology students' attitudes towards pedophiles regarding perceived dangerousness, intentionality, deviance, and punitive attitudes. In a one sample pre-post design, 162 students of the University of Groningen attended a lecture about pedophilia, which was held by a psychology master’s student. Participants learned about child sex offending and pedophilia in addition to the importance of distinguishing between pedophiles and child sex offenders (CSOs). The guest lecturer Gabriel, shared his experiences about growing up, coping, and living with pedophilia. Results of the Wilcoxon signed-rank test revealed significantly diminished negative attitudes towards pedophiles after the intervention. Students perceived pedophiles as less dangerous, having less intent, and being less psychologically deviant. Additionally, students' punitive attitudes towards pedophiles diminished significantly. Also, a thematic analysis revealed that students were highly interested in the topic of pedophilia and greatly appreciative of Gabriel sharing his story. This study was the first to provide direct contact with a pedophile within an anti-stigma intervention.

Keywords: pedophilia, anti-stigma intervention, punitive attitudes, attitude change

Procedia PDF Downloads 162
397 Work demand and Prevalence of Work-Related Musculoskeletal Disorders: A Case Study of Pakistan Aviation Maintenance Workers

Authors: Muzamil Mahmood, Afshan Naseem, Muhammad Zeeshan Mirza, Yasir Ahmad, Masood Raza

Abstract:

The purpose of this research is to analyze how aviation maintenance workers’ characteristics and work demand affect their development of work-related musculoskeletal disorders (WMSDs). Guided by literature on task characteristics, work demand, and WMSDs, data is collected from 128 aviation maintenance workers of private and public airlines. Data is then analyzed through descriptive and inferential statistics. It is found that task characteristics have a significant positive effect on WMSDs and an increase in tasks performed by aviation maintenance workers leads to increase in WMSDs. Work demand did not have a significant effect on WMSDs. The task characteristics of aviation maintenance workers moderates the relationship between their work demand and WMSDs. This reveals that task characteristics of aviation maintenance workers enhance the effect of work demand on WMSDs. The task characteristics of aviation maintenance workers are challenging and unpredictable. Subsequently, WMSDs are prevalent among aviation maintenance workers. The work demand of aviation maintenance workers does not influence their development of WMSDs. Pakistan Civil Aviation Authority should minimize the intensity of tasks assigned to aviation maintenance workers by introducing work dynamisms such as task sharing, job rotation, and probably teleworking to enhance flexibility. Human Resource and Recruitment Department need to consider the ability and fitness levels of potential aviation maintenance workers during recruitment. In addition, regular physical activities and ergonomic policies should be put in place by the management of the Pakistan Civil Aviation Authority to reduce the incidences of WMSDs.

Keywords: work related musculoskeletal disorders, ergonomics, occupational health and safety, human factors

Procedia PDF Downloads 123
396 “Referral for re-submission” – The Case of EFL Applied Linguistics Doctoral Defense Sessions

Authors: Alireza Jalilifar, Nadia Mayahi

Abstract:

An oral defense is the examination of a doctoral program in which the candidates display their academic capacity through sharing and disseminating the findings of their study and defending their position. In this challenging criticism-generating context, the examiners evaluate the PhD dissertation critically so as to confirm its scholarly merit or lack of it. To identify the examiners’ expectations of the viva, this study used a conversation analytic approach for analyzing the data. The research is inductive in that it seeks to develop theory that is grounded in the data. The data comprised transcripts of the question and answer section of two applied linguistics doctoral defense sessions from two accredited Iranian state universities in 2019, both of which are among the top Iranian universities on the list of Times Higher Education World University Rankings. In spite of the similar shortcomings and deficiencies, for instance, in terms of innovation, development, sampling, and treatment, raised by the examiners, one of these defenses passed with distinction while the other was referred for re-submission. It seems that the outcome of a viva, in an EFL context, not only depends on adherence to the rules and regulations of doctoral research but is also influenced to a certain extent by the strictness of the examiners and the candidates’ language proficiency and effective negotiation and communication skills in this confrontational communicative event. The findings of this study provide evidence for the issues determining the success or failure of PhD candidates in displaying their claims of scholarship during their defense sessions. This study has implications for both applied linguistics doctoral students and academics in EFL contexts who try to prove and authenticate the doctorateness of a dissertation.

Keywords: academic discourse, conversation analysis, doctoral defense, doctorateness, EFL

Procedia PDF Downloads 130
395 Cultural Works Interacting with the Generational Aesthetic Gap between Gen X and Gen Z in China: A Qualitative Study

Authors: Qianyu Zhang

Abstract:

The spread of digital technology in China has worsened the generation gap and intergenerational competition for cultural and aesthetic discourse. Meanwhile, the increased accessibility of cultural works has encouraged the sharing and inheritance of collective cultural memories between generations. However, not each cultural work can engage positively with efforts to bridge intergenerational aesthetic differences. This study argues that in contemporary China, where new media and the Internet are widely available, featured cultural works have more potential to help enhance the cultural aesthetic consensus among different generations, thus becoming an effective countermeasure to narrow the intergenerational aesthetic rift and cultural discontinuity. Specifically, the generational aesthetic gap is expected to be bridged or improved through the shared appreciation or consumption of cultural works that meet certain conditions by several generations. In-depth interviews of Gen X and Gen Z (N=15, respectively) in China uncovered their preferences and commonalities for cultural works and shared experiences in appreciating them. Results demonstrate that both generations’ shared appreciation of cultural work is a necessary but insufficient condition for its effective response to the generational aesthetic gap. Coding analysis rendered six dimensions that cultural works with the potential to bridge the intergenerational aesthetic divide should satisfy simultaneously: genre, theme, content, elements, quality, and accessibility. Cultural works that engage multiple senses/ compound realistic, domestic and contemporary cultural memories/ contain the narrative of family life and nationalism/ include more elements familiar to the previous generation/ are superb-produced and unaffected/ are more accessible better promote intergenerational aesthetic exchange and value recognition. Moreover, compared to the dilemma of the previous generation facing the aesthetic gap, the later generation plays a crucial role in bridging the generational aesthetic divide.

Keywords: cultural works, generation gap, generation X, generation Z, cultural memory

Procedia PDF Downloads 112
394 Promoting Open Educational Resources (OER) in Theological/Religious Education in Nigeria

Authors: Miracle Ajah

Abstract:

One of the biggest challenges facing Theological/Religious Education in Nigeria is access to quality learning materials. For instance at the Trinity (Union) Theological College, Umuahia, it was difficult for lecturers to access suitable and qualitative materials for instruction especially the ones that would suit the African context and stimulate a deep rooted interest among the students. Some textbooks written by foreign authors were readily available in the School Library, but were lacking in the College bookshops for students to own copies. Even when the College was able to order some of the books from abroad, it did not usher in the needed enthusiasm expected from the students because they were either very expensive or very difficult to understand during private studies. So it became necessary to develop contextual materials which were affordable and understandable, though with little success. The National Open University of Nigeria (NOUN)’s innovation in the development and sharing of learning resources through its Open Course ware is a welcome development and of great assistance to students. Apart from NOUN students who could easily access the materials, many others from various theological/religious institutes across the nation have benefited immensely. So, the thesis of this paper is that the promotion of open educational resources in theological/religious education in Nigeria would facilitate a better informed/equipped religious leadership, which would in turn impact its adherents for a healthier society and national development. Adopting a narrative and historical approach within the context of Nigeria’s educational system, the paper discusses: educational traditions in Nigeria; challenges facing theological/religious education in Nigeria; and benefits of open educational resources. The study goes further to making recommendations on how OER could positively influence theological/religious education in Nigeria. It is expected that theologians, religious educators, and ODL practitioners would find this work very useful.

Keywords: OER, theological education, religious education, Nigeria

Procedia PDF Downloads 318
393 Public Space, Environmental Violence and Female Vulnerability in Radwa Ashour’s Specters and Betool Khadiri’s Absent

Authors: Jihan Zakarriya

Abstract:

This paper aims at examining the concepts of gender vulnerability, militarized spaces and environmental degradation in Egyptian novelist Radwa Ashour’s Specters (1999) and Iraqi novelist Betool Khadiri’s Absent (2005). Although the socio-economic, environmental and political conditions in the 1990s- Egypt and Iraq are different, this paper argues that Ashour’s Specters and Khadiri’s Absent show the two societies as sharing a concern with the politics of public participation, individual freedom and political violence. For example, while Specters exposes the planned processes of economic-political and cultural violence towards Egyptian environment and people that undermine concepts of justice, equality and democracy, Absent shows the destructive effects of the systematic, successive waves of (international) militarized interferences and socio-economic sanctions imposed on Iraq following the Gulf War that hinder efforts of social development and kindle ethnic-religious violence and polarization in the country. This paper investigates and relates issues of gender, environmental and political violence and repression in Ashour’s Specters and Khadiri’s Absent in relation to the concepts of public space and security in the two countries. The paper argues that the selected novels articulate a particular awareness of the political-international conflicts and difficulties in the 1990s-Egypt and Iraq, with the aim both to emphasize the issue of gender as a tool of oppression and power hierarchy worldwide and to figure out new notions of public participation and change.

Keywords: gender violence, public space, environment, change

Procedia PDF Downloads 115
392 Maternal Awareness of Sudden Infant Death Syndrome: A Jordanian Study

Authors: Nemeh Ahmad Al-Akour, Ibrahem Alfaouri

Abstract:

Objective: To examine the level of maternal awareness of SIDS and its prevention amongst Jordanian mothers in the north of Jordan, as well as to determine their SIDS-related infant care practices. Design: A cross-sectional design. Setting: The study was conducted in maternal out-patients clinics of two teaching hospitals and three maternal and child health clinic in three major health care centers in Northern Jordan. Participants: A total of 356 mothers of infants attending the maternal and child health clinics were included in this study. Measurements and findings: A self-administered questionnaire was used for collecting data study. In this study, 64%of mothers didn’t hear about SIDS, while only 7% of mothers were able to identify factors risk-reducing recommendations. Avoidance of prone sleeping was the most frequently identified recommendation (5%). There were 67.7% of mothers who put their infant in a lateral position to sleep, 61% used soft mattress surface for their babies sleep and 25.8% who shared a bed with their babies. Employed mother, mothers of higher age, and mothers living within a nuclear family were the only factors associated with maternal awareness of SIDS. Friends were the highest a source of knowledge of SIDS for mothers (44.7%). Key conclusions: There was a low level of awareness of SIDS and its associated risk factor among the mothers in Jordan. The mothers' misconception about smoking and sleeping position for their infants requires further efforts. Implications for practice: To ensure raising awareness of infant care practice regarding SIDS, a national educational intervention on SIDS risk reduction strategies and recommendations is necessary for maintaining a low rate of SIDS in the population.

Keywords: bed sharing, infant care, Jordan, sleep position, sudden infant death

Procedia PDF Downloads 291
391 Understanding Retail Benefits Trade-offs of Dynamic Expiration Dates (DED) Associated with Food Waste

Authors: Junzhang Wu, Yifeng Zou, Alessandro Manzardo, Antonio Scipioni

Abstract:

Dynamic expiration dates (DEDs) play an essential role in reducing food waste in the context of the sustainable cold chain and food system. However, it is unknown for the trades-off in retail benefits when setting an expiration date on fresh food products. This study aims to develop a multi-dimensional decision-making model that integrates DEDs with food waste based on wireless sensor network technology. The model considers the initial quality of fresh food and the change rate of food quality with the storage temperature as cross-independent variables to identify the potential impacts of food waste in retail by applying s DEDs system. The results show that retail benefits from the DEDs system depend on each scenario despite its advanced technology. In the DEDs, the storage temperature of the retail shelf leads to the food waste rate, followed by the change rate of food quality and the initial quality of food products. We found that the DEDs system could reduce food waste when food products are stored at lower temperature areas. Besides, the potential of food savings in an extended replenishment cycle is significantly more advantageous than the fixed expiration dates (FEDs). On the other hand, the information-sharing approach of the DEDs system is relatively limited in improving sustainable assessment performance of food waste in retail and even misleads consumers’ choices. The research provides a comprehensive understanding to support the techno-economic choice of the DEDs associated with food waste in retail.

Keywords: dynamic expiry dates (DEDs), food waste, retail benefits, fixed expiration dates (FEDs)

Procedia PDF Downloads 92